cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2007-4277,https://securityvulnerability.io/vulnerability/CVE-2007-4277,,"The Trend Micro AntiVirus scan engine before 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content to the device via the IOCTL functionality. NOTE: this can be leveraged for privilege escalation by exploiting a buffer overflow in the handler for IOCTL 0xa0284403.",Trend Micro,"Pc-cillin Internet Security 2007,Scan Engine",,,0.0004199999966658652,false,false,false,false,,false,false,2007-10-30T22:00:00.000Z,0 CVE-2007-3873,https://securityvulnerability.io/vulnerability/CVE-2007-3873,,"Stack-based buffer overflow in vstlib32.dll 1.2.0.1012 in the SSAPI Engine 5.0.0.1066 through 5.2.0.1012 in Trend Micro AntiSpyware 3.5 and PC-Cillin Internet Security 2007 15.0 through 15.3, when the Venus Spy Trap (VST) feature is enabled, allows local users to cause a denial of service (service crash) or execute arbitrary code via a file with a long pathname, which triggers the overflow during a ReadDirectoryChangesW callback notification.",Trend Micro,"Pc-cillin Internet Security 2007,Antispyware",,,0.0004199999966658652,false,false,false,false,,false,false,2007-08-22T23:17:00.000Z,0 CVE-2007-0851,https://securityvulnerability.io/vulnerability/CVE-2007-0851,,"Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.",Trend Micro,"Interscan Emanager,Scanmail,Pc Cillin - Internet Security 2006,Interscan Viruswall,Officescan,Interscan Viruswall For Windows Nt,Portalprotect,Interscan Web Security Suite,Serverprotect,Control Manager,Viruswall,Webprotect,Interscan Webmanager,Pc-cillin Internet Security,Interscan Messaging Security Suite,Web Security Suite,Client-server-messaging Suite Smb,Interscan Viruswall Scan Engine,Client-server Suite Smb,Pc-cillin,Scanning Engine,Scanmail Emanager,Interscan Webprotect",,,0.8936799764633179,false,false,false,false,,false,false,2007-02-08T18:00:00.000Z,0 CVE-2007-0856,https://securityvulnerability.io/vulnerability/CVE-2007-0856,,"TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.",Trend Micro,"Trend Micro Antispyware,Damage Cleanup Services,Tmcomm.sys,Trend Micro Antirootkit Common Module,Pc-cillin Internet Security,Client-server-messaging Security,VSAPini.sys,Trend Micro Antivirus",,,0.0004199999966658652,false,false,false,false,,false,false,2007-02-08T18:00:00.000Z,0 CVE-2006-6458,https://securityvulnerability.io/vulnerability/CVE-2006-6458,,"The Trend Micro scan engine before 8.320 for Windows and before 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote attackers to cause a denial of service (CPU consumption and system hang) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero, which triggers an infinite loop.",Trend Micro,"Pc Cillin - Internet Security 2006,Officescan,Serverprotect",,,0.01363999955356121,false,false,false,false,,false,false,2006-12-11T17:00:00.000Z,0 CVE-2006-1379,https://securityvulnerability.io/vulnerability/CVE-2006-1379,,"Trend Micro PC-cillin Internet Security 2006 14.00.1485 and 14.10.0.1023, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying executable programs such as (1) tmntsrv.exe and (2) tmproxy.exe.",Trend Micro,Pc-cillin 2006,,,0.0007099999929778278,false,false,false,false,,false,false,2006-03-24T11:00:00.000Z,0 CVE-2005-3360,https://securityvulnerability.io/vulnerability/CVE-2005-3360,,"The installation of Trend Micro PC-Cillin Internet Security 2005 12.00 build 1244, and probably previous versions, uses insecure default ACLs, which allows local users to cause a denial of service (disabled service) and gain system privileges by modifying or moving critical program files.",Trend Micro,Pc-cillin 2005,,,0.0004199999966658652,false,false,false,false,,false,false,2005-12-14T20:00:00.000Z,0 CVE-2005-3379,https://securityvulnerability.io/vulnerability/CVE-2005-3379,,"Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an ""MZ"" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a ""triple headed"" program that contains EXE, EML, and HTML content, aka the ""magic byte bug.""",Trend Micro,"Pc-cillin 2005,Officescan",,,0.009929999709129333,false,false,false,false,,false,false,2005-10-30T14:34:00.000Z,0 CVE-2005-0533,https://securityvulnerability.io/vulnerability/CVE-2005-0533,,"Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.",Trend Micro,"Interscan Emanager,Scanmail,Serverprotect,Interscan Viruswall,Officescan,Interscan Web Security Suite,Interscan Webmanager,Interscan Messaging Security Suite,Control Manager,Client-server-messaging Suite Smb,Client-server Suite Smb,Pc-cillin,Portalprotect,Scanmail Emanager,Interscan Webprotect",,,0.21536000072956085,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0 CVE-2002-1349,https://securityvulnerability.io/vulnerability/CVE-2002-1349,,"Buffer overflow in pop3trap.exe for PC-cillin 2000, 2002, and 2003 allows local users to execute arbitrary code via a long input string to TCP port 110 (POP3).",Trend Micro,"Officescan,Pc-cillin",,,0.0010999999940395355,false,false,false,false,,false,false,2002-12-18T05:00:00.000Z,0 CVE-2000-0007,https://securityvulnerability.io/vulnerability/CVE-2000-0007,,"Trend Micro PC-Cillin does not restrict access to its internal proxy port, allowing remote attackers to conduct a denial of service.",Trend Micro,Pc-cillin,,,0.0032500000670552254,false,false,false,false,,false,false,1999-12-29T05:00:00.000Z,0